2.6.32-stable review patch. If anyone has any objections, please let us know.

------------------

From: Dan Rosenberg <drosenberg@vsecurity.com>

commit e68d3b316ab7b02a074edc4f770e6a746390cb7d upstream.

The SNDRV_HDSP_IOCTL_GET_CONFIG_INFO andSNDRV_HDSP_IOCTL_GET_CONFIG_INFO ioctls in hdspm.c and hdsp.c allowunprivileged users to read uninitialized kernel stack memory, becauseseveral fields of the hdsp{m}_config_info structs declared on the stackare not altered or zeroed before being copied back to the user. Thispatch takes care of it.